Crypto Money Exchange Founder and former CEO of Binance Changpeng Zhao (CZ) once again warned his followers against identity hunting attacks. In the message he shared in X, he stressed that the passwords should not be shared with customer representatives under any circumstances. In addition, instead of clicking on the links from the e-mail, he recommended the entry to the address bar by typing the URL of the site. Reminding that even a single leak can endanger the entire portfolio, the CZ described the identity of two -factor -based two -factor identity with unique and powerful passwords.
First Defense Against Online Identity Hunting: Password safety
Password safety It continues to be the weakest link in identity hunting attacks. The most basic rule that CZ underlines is “not demanding a password for real support representatives”, quite simple.
As it is known, scammers are deceiving crypto currency investors with scenarios that open a panic door such as “Your account is locked” or “additional verification”. Cz In order to prevent such traps from such traps, it recommends that URL should be written manually or the use of a reliable place. Even malicious add -ons placed in the browser can refer to imitation domain names. For this reason, it is the only shield that protects the crypto currencies that sometimes control the URL in the address bar.
CZ, one passwordThe use of multiple platforms underlined that the rest of the chain made the rest of the chain fragile. Password managers come into play here and create long, random and unique combinations for each site. When these software does not automatically fill the password when it notice the imitation domain names, it serves as an additional alarm. When the managers are installed correctly, the character series seized from a leaked database does not work in other accounts. Therefore, the potential impact of harmful counterfeit sites is significantly reduced.
2FA VERTERING METHOD WITH Hardware Based should be used
Of course, the powerful passwords alone are not enough for full protection. The CZ advised the choice of equipment -based two -factor authentication as an additional protection layer. WORKING WITH USB or NFC Yubikey Similar switches require physical approval during entry, most of the identity hunting campaigns are frustrated. In fact, some models are directly cryptographic bond between the site and the device with the FIDO2 protocol. The attacker refuses to authorize by detecting the real domain name even if he cloned the real domain name.
Today, when the online attack surface expands, SMS -based codes are increasingly insufficient. SIM SWAP attacks and copyable QR Codes It reveals the risks of mobile verification. Hardware tokens are transported in the pocket or on the switch to offer uninterrupted protection. Moreover, most modern stock markets and wallet applications recognize these devices in a few steps and reduce the installation process to minutes.
CZ’s recently made “Stay Safu!” In other words, the call to “stay safe” turns into a comprehensive safety prescription that requires combining password hygiene with 2FA with hardware -based.
Responsibility Rejection: The information contained in this article does not contain investment advice. Investors should be aware that crypto currencies carry high volatility and thus risk and carry out their operations in line with their own research.